Microsoft to fix zero-day flaw that meant just previewing an Outlook email could infect your computer

It’s one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment – but it’s quite a different level of threat when simply *previewing* a message in your email client infects your computer.

What is EMV, and why is it such a hot topic?

You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.

“Domestic spyware” apps increasingly precursor to violence – or murder

Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and even murder.

Surveillance cameras hijacked to mine Bitcoin while watching you

Malware written specifically for DVR recorders used for the output of surveillance cameras has forced some machines to mine Bitcoin – although the low-powered machines are ‘very bad’ miners, Wired points out.

With just days to go, just how many PCs are still running Windows XP?

If computers continue to run Windows XP, and don’t receive any more security patches. they are not just putting themselves and the data they carry at risk, they are endangering all of us who use the internet.

Attack on Samsung’s Boxee TV service leaks 158,000 passwords and emails

An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords – and what appears to be email addresses and full messaging histories for the victims.

Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute

DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes how the malware guesses router passwords as part of its campaign to misdirect users, send spam and infect new victims.

New Harris poll shows NSA revelations impact online shopping, banking, and more

A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.

Credit cards are dead, long live fingerprints? Samsung S5 first of ‘many’ scan-to-pay phones

Samsung’s Galaxy S5 offers a cutting-edge component that will change m-commerce forever – a fingerprint-scanner which offers instant authentication with one finger-swipe and which works in stores as well as online.

Tesla shocker as researcher picks electric supercar’s lock

The Model S is rated one of the safest cars on the road – but the electronic security system protecting its locks may not be quite as bulletproof, researchers claim. The six-digit PIN used to protect its lock can be brute-forced, or phished, by attackers.

Facebook security settings explained

The world’s most popular social media site has upped its security game recently. Here’s our guide to Facebook security settings.

How to purge your Facebook friends list

Having a huge number of Facebook friends may seem like a good thing, but it can also present a security threat. We Live Security has five tips to help you purge.

How to bank safely online

It’s important to be extra cautious when dealing with money online – even on secure banking websites. We Live Security has 5 tips to banking safely online.

5 signs that email’s not from your bank

Online bank accounts are a prime target for cybercriminals, so be suspicious of any e-mail from your bank. We Live Security has five tell-tale signs to look out for.

Top 5 iPhone security tips

iPhones might be one of the most secure smartphones around, but there are still ways to improve on perfection. Here are five top tips for iPhone security.

SMB Security Basics

Implementing security measures can help ensure you don’t become a statistic, and it doesn’t have to be expensive. Get tips from the experts at ESET. During this podcast, you’ll learn: Tips for boosting security on a limited budget How a security consulting service can save you money Common mistakes to avoid along the way

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

The Internet of Things isn’t a malware-laced game of cyber-Cluedo… yet

Will the future be a murderous game of ‘smart device’ Cluedo, where Colonel Mustard meets his death at the hands of a Wi-Fi pacemaker, and Miss Scarlett is consumed in a Smart Home-ignited blaze. Not likely, says David Harley – where’s the profit motive?

Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs

Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.

PRISM-proof system could turn servers into spook-proof fortresses

A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

Jean-Ian Boutin

Stephen Cobb

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.